CVE-2024-9475

4.9 MEDIUM

📋 TL;DR

This SQL injection vulnerability in the Poll Maker WordPress plugin allows authenticated attackers with administrator permissions to execute arbitrary SQL queries. Attackers can extract sensitive database information like user credentials or configuration data. Only WordPress sites using vulnerable versions of the Poll Maker plugin are affected.

💻 Affected Systems

Products:
  • Poll Maker – Versus Polls, Anonymous Polls, Image Polls WordPress plugin
Versions: All versions up to and including 5.4.6
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the Poll Maker plugin enabled. Only exploitable by authenticated users with administrator-level permissions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including extraction of administrator credentials, sensitive user data, and potential privilege escalation to full site control.

🟠

Likely Case

Extraction of sensitive poll data, user information, and potentially WordPress configuration details that could enable further attacks.

🟢

If Mitigated

Limited impact due to proper access controls and monitoring, with only authorized administrators able to exploit the vulnerability.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrator-level WordPress credentials. The vulnerability is in the order_by parameter handling.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.4.7 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3200000/poll-maker/tags/5.4.7/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Poll Maker' plugin. 4. Click 'Update Now' if available. 5. Alternatively, download version 5.4.7+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable Poll Maker Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate poll-maker

Restrict Administrator Access

all

Limit administrator accounts and implement strong authentication controls

🧯 If You Can't Patch

  • Implement strict access controls for administrator accounts and monitor administrator activity
  • Deploy web application firewall (WAF) rules to block SQL injection patterns in order_by parameters

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins → Poll Maker version. If version is 5.4.6 or lower, you are vulnerable.

Check Version:

wp plugin get poll-maker --field=version

Verify Fix Applied:

Verify Poll Maker plugin version is 5.4.7 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in WordPress or database logs
  • Multiple failed login attempts followed by administrator access
  • Unexpected database queries containing ORDER BY clauses with unusual parameters

Network Indicators:

  • HTTP POST requests to WordPress admin-ajax.php or admin-post.php with unusual order_by parameters
  • SQL error messages in HTTP responses

SIEM Query:

source="wordpress.log" AND "order_by" AND ("UNION" OR "SELECT" OR "FROM" OR "WHERE")

🔗 References

📤 Share & Export